-
561
Algorithm for blind separation of PCMA based on CHASE decoding
Published 2015-03-01“…On the basis of SOVA-PSP, a novel algorithm for blind separation of PCMA signal was presented based on CHASE decoding. …”
Get full text
Article -
562
New Iterative Method Based on Laplace Decomposition Algorithm
Published 2013-01-01“…We introduce a new form of Laplace decomposition algorithm (LDA). By this form a new iterative method was achieved in which there is no need to calculate Adomian polynomials, which require so much computational time for higher-order approximations. …”
Get full text
Article -
563
Simultaneous Pose and Correspondence Estimation Based on Genetic Algorithm
Published 2015-11-01“…Although several algorithms have been presented to solve the simultaneous pose and correspondence estimation problem, the correct solution may not be reached to with the traditional random-start initialization method. …”
Get full text
Article -
564
The Transcultural Diabetes Nutrition Algorithm: A Canadian Perspective
Published 2014-01-01“…The Transcultural Diabetes Nutrition Algorithm (tDNA) is a clinical tool designed to facilitate implementation of therapeutic lifestyle recommendations for people with or at risk for type 2 diabetes. …”
Get full text
Article -
565
-
566
Improved rule-based backward fuzzy reasoning algorithm
Published 2008-01-01“…An improved rule-based backward fuzzy reasoning algorithm was pointed. The algorithm is based on the fuzzy Petri net (FPN) which represents fuzzy production rules. …”
Get full text
Article -
567
Mechanism for developing a dividend policy, basic algorithms
Published 2020-12-01Get full text
Article -
568
OPTIMIZATION OF BLADE DEFLECTION BASED ON HYBRID GENETIC ALGORITHM
Published 2021-01-01Subjects: Get full text
Article -
569
A resource allocation algorithm based on double slots
Published 2016-05-01“…A resource allocation algorithm based on double slots was proposed to minimize the transmitting power in wireless communications.Being aware of the channel difference between the two adjacent slots,the second slot was allocated in advance partial of the data rate conventionally scheduled to the first slot when the corresponding user had perfect channel state.Consequently,most of the required data was loaded by the sub-carriers with fine channel gain and finally less transmitting power was needed.The simulation results indicate that the proposed algorithm can effectively decrease the transmitting power while meeting the users' target rate requirement.…”
Get full text
Article -
570
Privacy-protected crowd-sensed data trading algorithm
Published 2022-05-01“…To solve the problem that data privacy leakage of participants under the crowd-sensed data trading model, a privacy-protected crowd-sensed data trading algorithm was proposed.Firstly, to achieve the privacy protection of participants, an aggregation scheme based on differential privacy was designed.Participants were no longer needed to upload raw data, but analyzed and calculated the collected data according to the task requirements, and then sent the analysis results to the platform after adding noise in accordance with the privacy budget allocated by the platform to protect their privacy.Secondly, in order to ensure the credibility of participants, a reputation model of participants was proposed.Finally, in order to encourage consumers and participants to participate in transactions, a data trading optimization model was constructed by considering the consumer’s constraint on the result deviation,the participant’s privacy leakage compensation and platform profit, and a POA based on genetic algorithm was proposed to solve the model.The simulation results show that the POA not only protects the privacy of participants, but also increases the profit of the platform by 29.27% and 20.45% compared to VENUS and DPDT, respectively.…”
Get full text
Article -
571
Virtual Network Embedding Algorithm for Diverse Service Request
Published 2014-12-01“…In order to solve these problems, virtual network embedding algorithm for diverse service requests was proposed. …”
Get full text
Article -
572
Teaching Evaluation Algorithm Based on Grey Relational Analysis
Published 2021-01-01Get full text
Article -
573
Retracted: Study on the Macroeconomic Model Based on the Genetic Algorithm
Published 2023-01-01Get full text
Article -
574
Evaluating the Power of GPU Acceleration for IDW Interpolation Algorithm
Published 2014-01-01“…We first present two GPU implementations of the standard Inverse Distance Weighting (IDW) interpolation algorithm, the tiled version that takes advantage of shared memory and the CDP version that is implemented using CUDA Dynamic Parallelism (CDP). …”
Get full text
Article -
575
Anonymization algorithm based on time density for data stream
Published 2014-11-01“…Aim to address the problem of anonymization on data streams,an anonymization algorithm based on time density for data stream was proposed.Time weight and time density were designed for describing the data stream’s temporal,when the published clusters reach the threshold,it will delete the minimum time density cluster to ensure the availability of published clusters.Furthermore,in order to maintain the higher efficiency,the algorithm scans the data only once to satisfy the anonymization requirements for speeding up.The experimental results on the real dataset show that the algorithm is efficient and effective meanwhile the quality of the output data.…”
Get full text
Article -
576
Data algorithmic dependencies and their features vicissitude in relation sets
Published 2005-12-01Subjects: “…algorithmic dependences…”
Get full text
Article -
577
Research of survivability enhancement algorithm based on autonomous configuration
Published 2007-01-01“…Based on redundancy and diversity,the method of enhancing system survivability was proposed by dynami-cally configuring atomic modules.According to the history average response time,survivability curves were drawn.The autonomous configuration algorithm was designed based on the survivability of atomic modules,system efficiency and quality of service.The contrast experiment validated the algorithm’s correctness and validity in the condition of atomic modules have different failure rate.The simulation confirmed that this algorithm can enhance the service survivability when atomic module under attack or be ageing…”
Get full text
Article -
578
LANDMARC indoor positioning algorithm based on density-based spatial clustering of applications with noise–genetic algorithm–radial basis function neural network
Published 2020-02-01“…Aiming at the problem that existing radio frequency identification indoor positioning algorithm is prone to environmental interference and poor positioning accuracy, a LANDMARC indoor positioning algorithm based on density-based spatial clustering of applications with noise–genetic algorithm–radial basis function neural network is proposed. …”
Get full text
Article -
579
Naïve Bayes is an interpretable and predictive machine learning algorithm in predicting osteoporotic hip fracture in-hospital mortality compared to other machine learning algorithms.
Published 2025-01-01“…Overall, NB has much potential as an algorithm, due to its simplicity and interpretability whilst maintaining competitive predictive performance.…”
Get full text
Article -
580